{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,21]],"date-time":"2026-03-21T19:25:31Z","timestamp":1774121131867,"version":"3.50.1"},"reference-count":187,"publisher":"Association for Computing Machinery (ACM)","issue":"4","license":[{"start":{"date-parts":[[2020,8,25]],"date-time":"2020-08-25T00:00:00Z","timestamp":1598313600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000006","name":"Naval Research","doi-asserted-by":"crossref","award":["N000141512164"],"award-info":[{"award-number":["N000141512164"]}],"id":[{"id":"10.13039\/100000006","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Comput. Surv."],"published-print":{"date-parts":[[2021,7,31]]},"abstract":"<jats:p>Machine learning and statistical techniques are powerful tools for analyzing large amounts of medical and genomic data. On the other hand, ethical concerns and privacy regulations prevent free sharing of this data. Encryption techniques such as fully homomorphic encryption (FHE) enable evaluation over encrypted data. Using FHE, machine learning models such as deep learning, decision trees, and Naive Bayes have been implemented for privacy-preserving applications using medical data. These applications include classifying encrypted data and training models on encrypted data. FHE has also been shown to enable secure genomic algorithms, such as paternity and ancestry testing and privacy-preserving applications of genome-wide association studies.<\/jats:p>\n          <jats:p>This survey provides an overview of fully homomorphic encryption and its applications in medicine and bioinformatics. The high-level concepts behind FHE and its history are introduced, and details on current open-source implementations are provided. The state of fully homomorphic encryption for privacy-preserving techniques in machine learning and bioinformatics is reviewed, along with descriptions of how these methods can be implemented in the encrypted domain.<\/jats:p>","DOI":"10.1145\/3394658","type":"journal-article","created":{"date-parts":[[2020,7,7]],"date-time":"2020-07-07T12:38:30Z","timestamp":1594125510000},"page":"1-35","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":144,"title":["Homomorphic Encryption for Machine Learning in Medicine and Bioinformatics"],"prefix":"10.1145","volume":"53","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-1729-2962","authenticated-orcid":false,"given":"Alexander","family":"Wood","sequence":"first","affiliation":[{"name":"University of Michigan, Ann Arbor, MI, USA"}]},{"given":"Kayvan","family":"Najarian","sequence":"additional","affiliation":[{"name":"University of Michigan, Ann Arbor, MI, USA"}]},{"given":"Delaram","family":"Kahrobaei","sequence":"additional","affiliation":[{"name":"University of York, Heslington, United Kingdom"}]}],"member":"320","published-online":{"date-parts":[[2020,8,25]]},"reference":[{"key":"e_1_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/3214303"},{"key":"e_1_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/335191.335438"},{"key":"e_1_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2012.2230219"},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/258533.258604"},{"key":"e_1_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.3389\/fncom.2019.00031"},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-53018-4_6"},{"key":"e_1_2_1_8_1","volume-title":"Advances in Cryptology - CRYPTO 2014 (Lecture Notes in Computer Science)","author":"Alperin-Sheriff Jacob"},{"key":"e_1_2_1_9_1","doi-asserted-by":"crossref","unstructured":"R. Altman E. Asch D. Bloch G. Bole D. Borenstein K. Brandt W. Christy T. D. Cooke R. Greenwald M. Hochberg D. Howell D. Kaplan W. Koopman S. Longley III H. Mankin D. J. McShane T. Medsger Jr. R. Meenan W. Mikkelsen R. Moskowitz W. Murphy B. Rothschild M. Segal L. Sokoloff and F. Wolfe. 1986. Development of criteria for the classification and reporting of osteoarthritis: Classification of osteoarthritis of the knee. Arthritis 8 Rheumatism 29 8 (Aug. 1986) 1039--1049.  R. Altman E. Asch D. Bloch G. Bole D. Borenstein K. Brandt W. Christy T. D. Cooke R. Greenwald M. Hochberg D. Howell D. Kaplan W. Koopman S. Longley III H. Mankin D. J. McShane T. Medsger Jr. R. Meenan W. Mikkelsen R. Moskowitz W. Murphy B. Rothschild M. Segal L. Sokoloff and F. Wolfe. 1986. Development of criteria for the classification and reporting of osteoarthritis: Classification of osteoarthritis of the knee. Arthritis 8 Rheumatism 29 8 (Aug. 1986) 1039--1049.","DOI":"10.1002\/art.1780290816"},{"key":"e_1_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/2857705.2857731"},{"key":"e_1_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10623-011-9601-2"},{"key":"e_1_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1005140.1005147"},{"key":"e_1_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/2517840.2517843"},{"key":"e_1_2_1_15_1","volume-title":"Dima Alhadidi","author":"Al Aziz Mohammad Momin","year":"2017"},{"key":"e_1_2_1_16_1","volume-title":"Selected Areas in Cryptography -- SAC","author":"Bajard Jean-Claude","year":"2016"},{"key":"e_1_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046785"},{"key":"e_1_2_1_20_1","volume-title":"Proceedings of the Workshop on Selected Areas of Cryptography. 120--128","author":"Benaloh Josh","year":"1994"},{"key":"e_1_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-54388-7_10"},{"key":"e_1_2_1_22_1","first-page":"5","article-title":"Ordinal logistic regression in medical research","volume":"31","author":"Bender R.","year":"1997","journal-title":"Journal of the Royal College of Physicians of London"},{"key":"e_1_2_1_23_1","volume-title":"Progress in Cryptology -- LATINCRYPT 2015 (Lecture Notes in Computer Science), Kristin Lauter and Francisco Rodr\u00edguez-Henr\u00edquez (Eds.)","author":"Biasse Jean-Fran\u00e7ois"},{"key":"e_1_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/3310273.3323047"},{"key":"e_1_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30576-7_18"},{"key":"e_1_2_1_27_1","volume-title":"Progress in Cryptology - AFRICACRYPT 2018 (Lecture Notes in Computer Science)","author":"Bonnoron Guillaume"},{"key":"e_1_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1186\/s12859-018-2541-3"},{"key":"e_1_2_1_29_1","volume-title":"Improved Security for a Ring-Based Fully Homomorphic Encryption Scheme","author":"Bos Joppe W."},{"key":"e_1_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2015.23241"},{"key":"e_1_2_1_31_1","volume-title":"Chimera: A unified framework for B\/FV, TFHE and HEAAN fully homomorphic encryption and predictions for deep learning. Cryptology ePrint Archive, Report 2018\/758. https:\/\/eprint.iacr.org\/\/2018\/\/758.","author":"Boura Christina","year":"2018"},{"key":"e_1_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-96878-0_17"},{"key":"e_1_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-32009-5_50"},{"key":"e_1_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/2090236.2090262"},{"key":"e_1_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/FOCS.2011.12"},{"key":"e_1_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.5555\/2033036.2033075"},{"key":"e_1_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/2554797.2554799"},{"key":"e_1_2_1_38_1","doi-asserted-by":"crossref","unstructured":"Zvika Brakerski Vinod Vaikuntanathan and Craig Gentry. 2012. Fully homomorphic encryption without bootstrapping. In In Innovations in Theoretical Computer Science.  Zvika Brakerski Vinod Vaikuntanathan and Craig Gentry. 2012. Fully homomorphic encryption without bootstrapping. In In Innovations in Theoretical Computer Science.","DOI":"10.1145\/2090236.2090262"},{"key":"e_1_2_1_39_1","volume-title":"Financial Cryptography and Data Security (Lecture Notes in Computer Science)","author":"Brickell Justin"},{"key":"e_1_2_1_40_1","volume-title":"SEQUENCES\u201997: Proceedings of the Compression and Complexity of Sequences","author":"Broder Andrei Z.","year":"1997"},{"key":"e_1_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1098\/rstb.2014.0252"},{"key":"e_1_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-12612-4_6"},{"key":"e_1_2_1_45_1","volume-title":"Retrieved","author":"LIST.","year":"2018"},{"key":"e_1_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1186\/s12920-018-0397-z"},{"key":"e_1_2_1_50_1","volume-title":"Tancr\u00e8de Lepoint, Mehdi Tibouchi, and Aaram Yun.","author":"Cheon Jung Hee","year":"2013"},{"key":"e_1_2_1_52_1","volume-title":"Selected Areas in Cryptography - SAC 2018 (Lecture Notes in Computer Science)","author":"Cheon Jung Hee"},{"key":"e_1_2_1_54_1","volume-title":"Homomorphic Computation of Edit Distance","author":"Cheon Jung Hee"},{"key":"e_1_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-46800-5_20"},{"key":"e_1_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-53887-6_1"},{"key":"e_1_2_1_57_1","volume-title":"Advances in Cryptology - ASIACRYPT 2017 (Lecture Notes in Computer Science)","author":"Chillotti Ilaria"},{"key":"e_1_2_1_58_1","volume-title":"TFHE: Fast Fully Homomorphic Encryption over the Torus.","author":"Chillotti Ilaria","year":"2018"},{"key":"e_1_2_1_59_1","volume-title":"TFHE: Fast Fully Homomorphic Encryption Library.","author":"Chillotti Ilaria","year":"2016"},{"key":"e_1_2_1_60_1","article-title":"-04-30. Opportunities and obstacles for deep learning in biology and medicine","volume":"15","author":"Travers Ching","year":"2018","journal-title":"J. R. Soc. Interface"},{"key":"e_1_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-22174-8_3"},{"key":"e_1_2_1_62_1","volume-title":"Retrieved","author":"Homomorphic Encryption Standardization Consortium","year":"2018"},{"key":"e_1_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-54631-0_18"},{"key":"e_1_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.5555\/2033036.2033074"},{"key":"e_1_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-29011-4_27"},{"key":"e_1_2_1_67_1","volume-title":"Advances in Cryptology - EUROCRYPT 2016 (Lecture Notes in Computer Science), Marc Fischlin and Jean-S\u00e9bastien Coron (Eds.)","author":"Cramer Ronald"},{"key":"e_1_2_1_68_1","doi-asserted-by":"publisher","DOI":"10.1145\/3267973.3267974"},{"key":"e_1_2_1_69_1","unstructured":"Eric Crocket and Chris Peikert. 2017. \u039b \u25cb \u039b: Functional Lattice Cryptography. Retrieved from https:\/\/hackage.haskell.org\/package\/lol-apps.  Eric Crocket and Chris Peikert. 2017. \u039b \u25cb \u039b: Functional Lattice Cryptography. Retrieved from https:\/\/hackage.haskell.org\/package\/lol-apps."},{"key":"e_1_2_1_71_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243828"},{"key":"e_1_2_1_72_1","volume-title":"Vernam Lab. Retrieved","author":"Lab Vernam","year":"2018"},{"key":"e_1_2_1_73_1","doi-asserted-by":"publisher","DOI":"10.7146\/brics.v7i45.20212"},{"key":"e_1_2_1_74_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-010-0119-9"},{"key":"e_1_2_1_75_1","volume-title":"Retrieved","author":"CSIRO","year":"2013"},{"key":"e_1_2_1_76_1","doi-asserted-by":"publisher","DOI":"10.1145\/2381966.2381980"},{"key":"e_1_2_1_77_1","doi-asserted-by":"publisher","DOI":"10.1145\/2517840.2517849"},{"key":"e_1_2_1_78_1","volume-title":"Advances in Cryptology\u2014EUROCRYPT 2010 (Lecture Notes in Computer Science)","author":"van Dijk Marten"},{"key":"e_1_2_1_79_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10623-015-0095-1"},{"key":"e_1_2_1_80_1","unstructured":"Nathan Dowlin Ran Gilad-Bachrach Kim Laine Kristin Lauter Michael Naehrig and John Wernsing. 2015. Manual for Using Homomorphic Encryption for Bioinformatics. Retrieved from https:\/\/www.microsoft.com\/en-us\/research\/publication\/manual-for-using-homomorphic-encryption-for-bioinformatics\/.  Nathan Dowlin Ran Gilad-Bachrach Kim Laine Kristin Lauter Michael Naehrig and John Wernsing. 2015. Manual for Using Homomorphic Encryption for Bioinformatics. Retrieved from https:\/\/www.microsoft.com\/en-us\/research\/publication\/manual-for-using-homomorphic-encryption-for-bioinformatics\/."},{"key":"e_1_2_1_81_1","unstructured":"Radoje Drmanac. 2011-02-09. The advent of personal genome sequencing. Genetics in Medicine 13 (2011-02-09) 188--190.  Radoje Drmanac. 2011-02-09. The advent of personal genome sequencing. Genetics in Medicine 13 (2011-02-09) 188--190."},{"key":"e_1_2_1_82_1","volume-title":"FHEW: Bootstrapping homomorphic encryption in less than a second. In Advances in Cryptology\u2014EUROCRYPT","author":"Ducas L\u00e9o","year":"2015"},{"key":"e_1_2_1_83_1","unstructured":"Leo Ducas and Daniele Micciancio. 2017. FHEW A Fully Homomorphic Encryption Library. https:\/\/github.com\/lducas\/FHEW.  Leo Ducas and Daniele Micciancio. 2017. FHEW A Fully Homomorphic Encryption Library. https:\/\/github.com\/lducas\/FHEW."},{"key":"e_1_2_1_84_1","doi-asserted-by":"crossref","unstructured":"Cynthia Dwork. 2006. Differential Privacy. Springer Berlin 1--12.  Cynthia Dwork. 2006. Differential Privacy. Springer Berlin 1--12.","DOI":"10.1007\/11787006_1"},{"key":"e_1_2_1_85_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1985.1057074"},{"key":"e_1_2_1_87_1","volume-title":"A survey of homomorphic encryption for nonspecialists. EURASIP Journal on Information Security1 (Dec","author":"Fontaine Caroline","year":"2007"},{"key":"e_1_2_1_88_1","doi-asserted-by":"publisher","DOI":"10.1145\/989393.989457"},{"key":"e_1_2_1_89_1","volume-title":"CryptoExperts. Retrieved","year":"2016"},{"key":"e_1_2_1_90_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-001-0015-6"},{"key":"e_1_2_1_91_1","volume-title":"Office Journal of the European Union L 119 (April","author":"2016. Regulation (EU) 2016\/679 of the European Parliament and of the Council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing Directive 95\/46\/EC.","year":"2016"},{"key":"e_1_2_1_92_1","first-page":"176","article-title":"Homomorphic encryption for finite automata","volume":"2019","author":"Genise Nicholas","year":"2019","journal-title":"IACR Cryptology ePrint Archive"},{"key":"e_1_2_1_94_1","doi-asserted-by":"publisher","DOI":"10.1145\/1536414.1536440"},{"key":"e_1_2_1_95_1","doi-asserted-by":"publisher","DOI":"10.1145\/1666420.1666444"},{"key":"e_1_2_1_96_1","doi-asserted-by":"publisher","DOI":"10.5555\/1881412.1881422"},{"key":"e_1_2_1_97_1","first-page":"609","article-title":"Computing on the Edge of Chaos","volume":"106","author":"Gentry Craig","year":"2014","journal-title":"Structure and Randomness in Encrypted Computation. Technical Report"},{"key":"e_1_2_1_99_1","doi-asserted-by":"publisher","DOI":"10.5555\/2008684.2008697"},{"key":"e_1_2_1_100_1","volume-title":"Smart","author":"Gentry Craig","year":"2012"},{"key":"e_1_2_1_101_1","volume-title":"Smart","author":"Gentry Craig","year":"2012"},{"key":"e_1_2_1_102_1","volume-title":"Smart","author":"Gentry Craig","year":"2012"},{"key":"e_1_2_1_103_1","volume-title":"Smart","author":"Gentry Craig","year":"2012"},{"key":"e_1_2_1_104_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-13190-5_26"},{"key":"e_1_2_1_105_1","volume-title":"Homomorphic encryption from learning with errors: Conceptually-simpler, asymptotically-faster, attribute-based","author":"Gentry Craig"},{"key":"e_1_2_1_106_1","unstructured":"Ran Gilad-Bachrach Nathan Dowlin Kim Laine Kristin Lauter Michael Naehrig and John Wernsing. 2016. CryptoNets: Applying neural networks to encrypted data with high throughput and accuracy. In PMLR. 201--210.  Ran Gilad-Bachrach Nathan Dowlin Kim Laine Kristin Lauter Michael Naehrig and John Wernsing. 2016. CryptoNets: Applying neural networks to encrypted data with high throughput and accuracy. In PMLR. 201--210."},{"key":"e_1_2_1_107_1","doi-asserted-by":"publisher","DOI":"10.1145\/800070.802212"},{"key":"e_1_2_1_108_1","doi-asserted-by":"publisher","DOI":"10.1016\/0022-0000(84)90070-9"},{"key":"e_1_2_1_109_1","volume-title":"Bio-inspired Information and Communication Technologies (Cham) (Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering)","author":"Gribov Alexey"},{"key":"e_1_2_1_110_1","first-page":"17","article-title":"Practical private-key fully homomorphic encryption in rings. Groups, Complexity","volume":"10","author":"Gribov Alexey","year":"2018","journal-title":"Cryptology"},{"key":"e_1_2_1_111_1","volume-title":"Tutorials on the Foundations of Cryptography","author":"Halevi Shai","edition":"1"},{"key":"e_1_2_1_112_1","volume-title":"Topics in Cryptology\u2014CT-RSA 2019 (Lecture Notes in Computer Science)","author":"Halevi Shai"},{"key":"e_1_2_1_114_1","volume-title":"The Elements of Statistical Learning","author":"Hastie Trevor","edition":"2"},{"key":"e_1_2_1_115_1","volume-title":"CryptoLab Inc. Retrieved","author":"CryptoLab Inc.","year":"2018"},{"key":"e_1_2_1_116_1","volume-title":"IBM Corp. Retrieved","author":"IBM Corp.","year":"2014"},{"key":"e_1_2_1_117_1","volume-title":"Retrieved","author":"HES.","year":"2019"},{"key":"e_1_2_1_118_1","volume-title":"CryptoDL: Deep Neural Networks over Encrypted Data. (Nov","author":"Hesamifard Ehsan","year":"2017"},{"key":"e_1_2_1_119_1","doi-asserted-by":"publisher","DOI":"10.1515\/popets-2018-0024"},{"key":"e_1_2_1_120_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-46447-2_31"},{"key":"e_1_2_1_121_1","volume-title":"Silverman","author":"Hoffstein Jeffrey","year":"1998"},{"key":"e_1_2_1_122_1","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pgen.1000167"},{"key":"e_1_2_1_123_1","volume-title":"Revised Papers from the International Conference on Cryptography and Lattices (CaLC\u201901)","author":"Howgrave-Graham Nick"},{"key":"e_1_2_1_124_1","volume-title":"Galois Inc. Retrieved","author":"Galois Inc.","year":"2018"},{"key":"e_1_2_1_125_1","volume-title":"RoboCup 2001: Robot Soccer World Cup V, Andreas Birk, Silvia Coradeschi, and Satoshi Tadokoro (Eds.).","author":"Jarrous Ayman"},{"key":"e_1_2_1_126_1","volume-title":"Selected Areas in Cryptography\u2014SAC","author":"J\u00e4schke Angela","year":"2018"},{"key":"e_1_2_1_127_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243837"},{"key":"e_1_2_1_128_1","volume-title":"27th USENIX Security Symposium (USENIX Security'18)","author":"Juvekar Chiraag","year":"2018"},{"key":"e_1_2_1_129_1","first-page":"2011","article-title":"-03-31. Predictive data mining for medical diagnosis: An overview of heart disease prediction","volume":"17","author":"Jyoti Soni","year":"2011","journal-title":"International Journal of Computer Applications"},{"key":"e_1_2_1_130_1","volume-title":"We will find you: DNA search used to nab Golden State Killer can home in on about 60% of white Americans. Science (Oct","author":"Kaiser Jocelyn","year":"2018"},{"key":"e_1_2_1_131_1","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2015.2500576"},{"key":"e_1_2_1_132_1","doi-asserted-by":"publisher","DOI":"10.1186\/s12920-018-0401-7"},{"key":"e_1_2_1_134_1","volume-title":"Towards privacy-preserving medical cloud computing using homomorphic encryption. Virtual and Mobile Healthcare: Breakthroughs in Research and Practice","author":"Kocabas Ovunc","year":"2020"},{"key":"e_1_2_1_135_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0933-3657(01)00077-X"},{"key":"e_1_2_1_136_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2012.2219653"},{"key":"e_1_2_1_137_1","series-title":"Lecture Notes in Computer Science (topics in cryptology ct-rsa 2018 ed.)","volume-title":"High-precision arithmetic in homomorphic encryption","author":"Laine Kim"},{"key":"e_1_2_1_138_1","volume-title":"EPFL-LDS. Retrieved","author":"LDS.","year":"2019"},{"key":"e_1_2_1_139_1","volume-title":"Private Computation on Encrypted Genomic Data","author":"Lauter Kristin"},{"key":"e_1_2_1_140_1","volume-title":"Multi-key privacy-preserving deep learning in cloud computing. Future Generation Computer Systems 74 (Sept","author":"Li Ping","year":"2017"},{"key":"e_1_2_1_141_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-44598-6_3"},{"key":"e_1_2_1_142_1","volume-title":"Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security","author":"Liu Jian"},{"key":"e_1_2_1_143_1","doi-asserted-by":"publisher","DOI":"10.1145\/2213977.2214086"},{"key":"e_1_2_1_144_1","first-page":"2015","article-title":"-12-21. Privacy-preserving genome-wide association studies on cloud environment using fully homomorphic encryption","volume":"15","author":"Lu Wen-Jie","year":"2015","journal-title":"BMC Med. Inf. Decis. Making"},{"key":"e_1_2_1_145_1","doi-asserted-by":"publisher","DOI":"10.1145\/2535925"},{"key":"e_1_2_1_146_1","volume-title":"Non-interactive privacy-preserving neural network prediction. Inf. Sci. 481 (May","author":"Ma Xu","year":"2019"},{"key":"e_1_2_1_147_1","volume-title":"AMIA Annual Symposium Proceedings 2006 (02","author":"Malin Bradley","year":"2006"},{"key":"e_1_2_1_148_1","first-page":"6","article-title":"A survey on fully homomorphic encryption: An engineering perspective","volume":"50","author":"Martins Paulo","year":"2017","journal-title":"ACM Comput. Surv."},{"key":"e_1_2_1_150_1","first-page":"851","article-title":"Deep learning in bioinformatics","volume":"18","author":"Min Seonwoo","year":"2017","journal-title":"Briefings Bioinf."},{"key":"e_1_2_1_151_1","doi-asserted-by":"publisher","DOI":"10.1093\/bib\/bbx044"},{"key":"e_1_2_1_152_1","volume-title":"ACM Conference on Computer and Communications Security. ACM, 35--52","author":"Mohassel Payman","year":"2018"},{"key":"e_1_2_1_153_1","doi-asserted-by":"crossref","unstructured":"P. Mohassel and Y. Zhang. 2017-05. SecureML: A system for scalable privacy-preserving machine learning. 19--38.  P. Mohassel and Y. Zhang. 2017-05. SecureML: A system for scalable privacy-preserving machine learning. 19--38.","DOI":"10.1109\/SP.2017.12"},{"key":"e_1_2_1_154_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISCAS.2014.6865753"},{"key":"e_1_2_1_155_1","volume-title":"Bioinformatics: Sequence and Genome Analysis","author":"Mount David W.","year":"2004","edition":"2"},{"key":"e_1_2_1_156_1","doi-asserted-by":"publisher","DOI":"10.1145\/288090.288106"},{"key":"e_1_2_1_157_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046660.2046682"},{"key":"e_1_2_1_158_1","doi-asserted-by":"publisher","DOI":"10.1145\/2767007"},{"key":"e_1_2_1_159_1","first-page":"543","article-title":"A method of solving a convex programming problem with convergence rate O(l \/k2)","volume":"269","author":"Nexterov Yu. E.","year":"1983","journal-title":"Dokl. Akad. Nauk SSSR"},{"key":"e_1_2_1_160_1","unstructured":"NuCypher. 2018. NuCypher Fully Homomorphic Encryption (NuFHE). NuCypher. https:\/\/github.com\/nucypher\/nufhe.  NuCypher. 2018. NuCypher Fully Homomorphic Encryption (NuFHE). NuCypher. https:\/\/github.com\/nucypher\/nufhe."},{"key":"e_1_2_1_161_1","doi-asserted-by":"publisher","DOI":"10.1056\/NEJMp1606181"},{"key":"e_1_2_1_162_1","volume-title":"Retrieved","author":"U.S. Department of Health 8 Human Services.","year":"1996"},{"key":"e_1_2_1_163_1","volume-title":"EUROCRYPT (Lecture Notes in Computer Science)","author":"Okamoto Tatsuaki"},{"key":"e_1_2_1_164_1","volume-title":"Advances in Cryptology - EUROCRYPT\u201999 (Lecture Notes in Computer Science)","author":"Paillier Pascal"},{"key":"e_1_2_1_165_1","unstructured":"PALISADE. 2020. The PALISADE Lattice Cryptography Library. https:\/\/palisade-crypto.org\/software-library\/.  PALISADE. 2020. The PALISADE Lattice Cryptography Library. https:\/\/palisade-crypto.org\/software-library\/."},{"key":"e_1_2_1_166_1","doi-asserted-by":"publisher","DOI":"10.1561\/0400000074"},{"key":"e_1_2_1_167_1","volume-title":"Retrieved","author":"Peikert Chris","year":"2018"},{"key":"e_1_2_1_168_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2017.2787987"},{"key":"e_1_2_1_169_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1016409317640"},{"key":"e_1_2_1_170_1","volume-title":"Ryan","author":"Polyakov Yuriy","year":"2017"},{"key":"e_1_2_1_171_1","doi-asserted-by":"publisher","DOI":"10.1109\/BigData.2018.8622575"},{"key":"e_1_2_1_172_1","volume-title":"Retrieved","year":"2018"},{"key":"e_1_2_1_174_1","doi-asserted-by":"publisher","DOI":"10.1145\/1060590.1060603"},{"key":"e_1_2_1_175_1","unstructured":"Microsoft Research. 2017. Microsoft SEAL (release 2.3). https:\/\/github.com\/Microsoft\/SEAL.  Microsoft Research. 2017. Microsoft SEAL (release 2.3). https:\/\/github.com\/Microsoft\/SEAL."},{"key":"e_1_2_1_176_1","unstructured":"Microsoft Research. 2018. Microsoft SEAL (release 3.0). http:\/\/sealcrypto.org.  Microsoft Research. 2018. Microsoft SEAL (release 3.0). http:\/\/sealcrypto.org."},{"key":"e_1_2_1_177_1","unstructured":"Microsoft Research. 2019. Microsoft SEAL (release 3.3). https:\/\/github.com\/Microsoft\/SEAL.  Microsoft Research. 2019. Microsoft SEAL (release 3.3). https:\/\/github.com\/Microsoft\/SEAL."},{"key":"e_1_2_1_178_1","doi-asserted-by":"publisher","DOI":"10.1145\/3196494.3196522"},{"key":"e_1_2_1_179_1","first-page":"165","article-title":"On data banks and privacy homomorphisms","volume":"4","author":"Rivest Ronald","year":"1978","journal-title":"Found. Secure Comput."},{"key":"e_1_2_1_180_1","doi-asserted-by":"publisher","DOI":"10.1145\/359340.359342"},{"key":"e_1_2_1_181_1","doi-asserted-by":"crossref","volume-title":"A scalable implementation of fully homomorphic encryption built on NTRU","author":"Rohloff Kurt","DOI":"10.1007\/978-3-662-44774-1_18"},{"key":"e_1_2_1_182_1","volume-title":"Medical Image Computing and Computer-Assisted Intervention (MICCAI) (LNCS)","volume":"9351","author":"Ronneberger O."},{"key":"e_1_2_1_183_1","first-page":"1","article-title":"Deepsecure: Scalable provably-secure deep learning","volume":"2","author":"Rouhani Bita Darvish","year":"2018","journal-title":"DAC. ACM"},{"key":"e_1_2_1_184_1","volume-title":"A generic framework for privacy preserving deep learning. CoRR abs\/1811.04017","author":"Ryffel Theo","year":"2018"},{"key":"e_1_2_1_185_1","unstructured":"Md. Nazmus Sadat Md. Momin Al Aziz Noman Mohammed Feng Chen Shuang Wang and Xiaoqian Jiang. 2017-03-07. SAFETY: Secure gwAs in federated environment through a hYbrid solution with Intel SGX and homomorphic encryption. (2017-03-07). https:\/\/arxiv.org\/abs\/1703.02577v1.  Md. Nazmus Sadat Md. Momin Al Aziz Noman Mohammed Feng Chen Shuang Wang and Xiaoqian Jiang. 2017-03-07. SAFETY: Secure gwAs in federated environment through a hYbrid solution with Intel SGX and homomorphic encryption. (2017-03-07). https:\/\/arxiv.org\/abs\/1703.02577v1."},{"key":"e_1_2_1_186_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00607-019-00711-w"},{"key":"e_1_2_1_187_1","doi-asserted-by":"publisher","DOI":"10.1145\/3158363"},{"key":"e_1_2_1_188_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813687"},{"key":"e_1_2_1_189_1","volume-title":"Retrieved","author":"Shoup Victor","year":"2020"},{"key":"e_1_2_1_190_1","doi-asserted-by":"crossref","volume-title":"Fully homomorphic encryption for mathematicians","author":"Silverberg Alice","DOI":"10.1090\/conm\/606\/12143"},{"key":"e_1_2_1_191_1","doi-asserted-by":"crossref","unstructured":"N. P. Smart and F. Vercauteren. 2010. Fully homomorphic encryption with relatively small key and ciphertext sizes. In Public Key Cryptography - PKC 2010 (Lecture Notes in Computer Science) Phong Q. Nguyen and David Pointcheval (Eds.). Springer Berlin 420--443.  N. P. Smart and F. Vercauteren. 2010. Fully homomorphic encryption with relatively small key and ciphertext sizes. In Public Key Cryptography - PKC 2010 (Lecture Notes in Computer Science) Phong Q. Nguyen and David Pointcheval (Eds.). Springer Berlin 420--443.","DOI":"10.1007\/978-3-642-13013-7_25"},{"key":"e_1_2_1_192_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10623-012-9720-4"},{"key":"e_1_2_1_193_1","volume-title":"Advances in Cryptology - ASIACRYPT 2010 (Lecture Notes in Computer Science)","author":"Stehl\u00e9 Damien"},{"key":"e_1_2_1_194_1","doi-asserted-by":"publisher","DOI":"10.5555\/2008684.2008690"},{"key":"e_1_2_1_195_1","doi-asserted-by":"crossref","unstructured":"X. Sun P. Zhang J. K. Liu J. Yu and W. Xie. 2018. Private machine learning classification based on fully homomorphic encryption. IEEE Trans. Emerging Top. Comput. (2018). Early access.  X. Sun P. Zhang J. K. Liu J. Yu and W. Xie. 2018. Private machine learning classification based on fully homomorphic encryption. IEEE Trans. Emerging Top. Comput. (2018). Early access.","DOI":"10.1109\/TETC.2018.2794611"},{"key":"e_1_2_1_196_1","first-page":"309","article-title":"All in the family: Privacy and DNA familial searching","volume":"23","author":"Suter Sonia M.","year":"2010","journal-title":"Harv. J. Law Technol."},{"key":"e_1_2_1_197_1","volume-title":"In Proceedings of the 23rd International Conference on the Theory and Applications of Cryptology and Information Security","volume":"10624","author":"Takagi Tsuyoshi","year":"2017"},{"key":"e_1_2_1_198_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00778-006-0041-y"},{"key":"e_1_2_1_199_1","doi-asserted-by":"publisher","DOI":"10.1109\/FOCS.2011.98"},{"key":"e_1_2_1_200_1","volume-title":"HEALER: Homomorphic computation of ExAct Logistic rEgRession for secure rare disease variants analysis in GWAS. Bioinf. (Oxford, England) 32, 2 (Jan.","author":"Wang Shuang","year":"2016"},{"key":"e_1_2_1_201_1","volume-title":"Proceedings of the 2012 IEEE Conference on High Performance Extreme Computing. 1--5.","author":"Wang W."},{"key":"e_1_2_1_202_1","doi-asserted-by":"publisher","DOI":"10.1515\/popets-2016-0043"},{"key":"e_1_2_1_203_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2949782"},{"key":"e_1_2_1_204_1","doi-asserted-by":"publisher","DOI":"10.5555\/1382436.1382751"},{"key":"e_1_2_1_205_1","doi-asserted-by":"publisher","DOI":"10.1145\/2517488.2517497"},{"key":"e_1_2_1_206_1","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2015.2470255"},{"key":"e_1_2_1_207_1","first-page":"2015","article-title":"-12-21. FORESEE: Fully outsourced secuRe gEnome study basEd on homomorphic encryption","volume":"15","author":"Zhang Yuchen","year":"2015","journal-title":"BMC Med. Inf. Decis. Making"},{"key":"e_1_2_1_208_1","doi-asserted-by":"publisher","DOI":"10.1145\/321796.321811"}],"container-title":["ACM Computing Surveys"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3394658","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3394658","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T21:31:30Z","timestamp":1750195890000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3394658"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,8,25]]},"references-count":187,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2021,7,31]]}},"alternative-id":["10.1145\/3394658"],"URL":"https:\/\/doi.org\/10.1145\/3394658","relation":{},"ISSN":["0360-0300","1557-7341"],"issn-type":[{"value":"0360-0300","type":"print"},{"value":"1557-7341","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,8,25]]},"assertion":[{"value":"2019-08-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2020-04-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2020-08-25","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}